Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/documentation/bookshandbookfirewalls_index/fr_FR/units/?format=api&page=10
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 711,
    "next": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/units/?format=api&page=11",
    "previous": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/units/?format=api&page=9",
    "results": [
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "NAT stands for _Network Address Translation_.  NAT function enables the private LAN behind the firewall to share a single ISP-assigned IP address, even if that address is dynamically assigned.  NAT allows each computer in the LAN to have Internet access, without having to pay the ISP for multiple Internet accounts or IP addresses."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5659716456510042285,
            "content_hash": 5659716456510042285,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:143",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 34,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 53,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219682/?format=api",
            "priority": 100,
            "id": 1220657,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ce8b5a2177b6b0ad",
            "url": "https://translate-dev.freebsd.org/api/units/1220657/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.254424Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "NAT will automatically translate the private LAN IP address for each system on the LAN to the single public IP address as packets exit the firewall bound for the public Internet.  It also performs the reverse translation for returning packets."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2047907431550019352,
            "content_hash": -2047907431550019352,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:146",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 35,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 40,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219684/?format=api",
            "priority": 100,
            "id": 1220658,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=63945f0a919418e8",
            "url": "https://translate-dev.freebsd.org/api/units/1220658/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.264099Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "When working with the firewall rules, be _very careful_.  Some configurations _can lock the administrator out_ of the server.  To be on the safe side, consider performing the initial firewall configuration from the local console rather than doing it remotely over ssh."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7338810420301560613,
            "content_hash": 7338810420301560613,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:158",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 40,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 42,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219686/?format=api",
            "priority": 100,
            "id": 1220659,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=e5d8b131d0027b25",
            "url": "https://translate-dev.freebsd.org/api/units/1220659/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.290122Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Since FreeBSD 5.3, a ported version of OpenBSD's PF firewall has been included as an integrated part of the base system.  PF is a complete, full-featured firewall that has optional support for ALTQ (Alternate Queuing), which provides Quality of Service (QoS)."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5436669258766195062,
            "content_hash": 5436669258766195062,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:165",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 42,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219688/?format=api",
            "priority": 100,
            "id": 1220660,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=cb72ede2da0b9976",
            "url": "https://translate-dev.freebsd.org/api/units/1220660/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.368265Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The OpenBSD Project maintains the definitive reference for PF in the http://www.openbsd.org/faq/pf/[PF FAQ].  Peter Hansteen maintains a thorough PF tutorial at http://home.nuug.no/\\~peter/pf/[http://home.nuug.no/~peter/pf/]."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4286794054122631940,
            "content_hash": -4286794054122631940,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:168",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 43,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219690/?format=api",
            "priority": 100,
            "id": 1220661,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=44823f852ac38cfc",
            "url": "https://translate-dev.freebsd.org/api/units/1220661/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.395860Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "When reading the http://www.openbsd.org/faq/pf/[PF FAQ], keep in mind that FreeBSD's version of PF has diverged substantially from the upstream OpenBSD version over the years.  Not all features work the same way on FreeBSD as they do in OpenBSD and vice versa."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -178027849858906568,
            "content_hash": -178027849858906568,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:173",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 44,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219692/?format=api",
            "priority": 100,
            "id": 1220662,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=7d87849d21088638",
            "url": "https://translate-dev.freebsd.org/api/units/1220662/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.448421Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The {freebsd-pf} is a good place to ask questions about configuring and running the PF firewall.  Check the mailing list archives before asking a question as it may have already been answered."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4761945929291648951,
            "content_hash": -4761945929291648951,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:177",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 45,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 32,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219694/?format=api",
            "priority": 100,
            "id": 1220663,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=3dea2b683cf43049",
            "url": "https://translate-dev.freebsd.org/api/units/1220663/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.456659Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section of the Handbook focuses on PF as it pertains to FreeBSD.  It demonstrates how to enable PF and ALTQ.  It also provides several examples for creating rulesets on a FreeBSD system."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 1689374874211002554,
            "content_hash": 1689374874211002554,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:181",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 46,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 33,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219696/?format=api",
            "priority": 100,
            "id": 1220664,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=9771dd7f55d128ba",
            "url": "https://translate-dev.freebsd.org/api/units/1220664/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.464162Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To use PF, its kernel module must be first loaded.  This section describes the entries that can be added to [.filename]#/etc/rc.conf# to enable PF."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4797164388868072026,
            "content_hash": -4797164388868072026,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:186",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 48,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 24,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219698/?format=api",
            "priority": 100,
            "id": 1220665,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=3d6d0c67a05d5da6",
            "url": "https://translate-dev.freebsd.org/api/units/1220665/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.475409Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Additional options, described in man:pfctl[8], can be passed to PF when it is started.  Add or change this entry in [.filename]#/etc/rc.conf# and specify any required flags between the two quotes (`\"\"`):"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5393438602768232593,
            "content_hash": 5393438602768232593,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:196",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 51,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 31,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219700/?format=api",
            "priority": 100,
            "id": 1220666,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=cad957d563e13091",
            "url": "https://translate-dev.freebsd.org/api/units/1220666/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.560853Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "PF will not start if it cannot find its ruleset configuration file.  By default, FreeBSD does not ship with a ruleset and there is no [.filename]#/etc/pf.conf#.  Example rulesets can be found in [.filename]#/usr/share/examples/pf/#.  If a custom ruleset has been saved somewhere else, add a line to [.filename]#/etc/rc.conf# which specifies the full path to the file:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5043099665458832786,
            "content_hash": 5043099665458832786,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:206",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 53,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 55,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219702/?format=api",
            "priority": 100,
            "id": 1220667,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=c5fcb06d1e90a592",
            "url": "https://translate-dev.freebsd.org/api/units/1220667/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.571514Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Logging support for PF is provided by man:pflog[4].  To enable logging support, add `pflog_enable=yes` to [.filename]#/etc/rc.conf#:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -3332240019304212177,
            "content_hash": -3332240019304212177,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:214",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 55,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 16,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219704/?format=api",
            "priority": 100,
            "id": 1220668,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=51c1815b7f08192f",
            "url": "https://translate-dev.freebsd.org/api/units/1220668/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.647846Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "By default, PF reads its configuration rules from [.filename]#/etc/pf.conf# and modifies, drops, or passes packets according to the rules or definitions specified in this file.  The FreeBSD installation includes several sample files located in [.filename]#/usr/share/examples/pf/#.  Refer to the http://www.openbsd.org/faq/pf/[PF FAQ] for complete coverage of PF rulesets."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7651881411804874895,
            "content_hash": 7651881411804874895,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:246",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 63,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 46,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219706/?format=api",
            "priority": 100,
            "id": 1220669,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ea30f19a460b488f",
            "url": "https://translate-dev.freebsd.org/api/units/1220669/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.753013Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To control PF, use `pfctl`.  <<pfctl>> summarizes some useful options to this command.  Refer to man:pfctl[8] for a description of all available options:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4191281583005312873,
            "content_hash": -4191281583005312873,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:250",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 64,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 23,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219708/?format=api",
            "priority": 100,
            "id": 1220670,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=45d5939b4b54d897",
            "url": "https://translate-dev.freebsd.org/api/units/1220670/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.760709Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "package:security/sudo[] is useful for running commands like `pfctl` that require elevated privileges.  It can be installed from the Ports Collection."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7907228835403159951,
            "content_hash": -7907228835403159951,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:277",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 80,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 20,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219710/?format=api",
            "priority": 100,
            "id": 1220671,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=1243e144bc11a671",
            "url": "https://translate-dev.freebsd.org/api/units/1220671/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.790492Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To keep an eye on the traffic that passes through the PF firewall, consider installing the package:sysutils/pftop[] package or port.  Once installed, pftop can be run to view a running snapshot of traffic in a format which is similar to man:top[1]."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4316250542905243179,
            "content_hash": 4316250542905243179,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:281",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 81,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219712/?format=api",
            "priority": 100,
            "id": 1220672,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=bbe667001374362b",
            "url": "https://translate-dev.freebsd.org/api/units/1220672/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.798461Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section demonstrates how to create a customized ruleset.  It starts with the simplest of rulesets and builds upon its concepts using several examples to demonstrate real-world usage of PF's many features."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6634331765751924299,
            "content_hash": -6634331765751924299,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:287",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 83,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 32,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219714/?format=api",
            "priority": 100,
            "id": 1220673,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=23ee1e68c44439b5",
            "url": "https://translate-dev.freebsd.org/api/units/1220673/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.857314Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The simplest possible ruleset is for a single machine that does not run any services and which needs access to one network, which may be the Internet.  To create this minimal ruleset, edit [.filename]#/etc/pf.conf# so it looks like this:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2210005314539476331,
            "content_hash": 2210005314539476331,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:290",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 84,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 39,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219716/?format=api",
            "priority": 100,
            "id": 1220674,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=9eab841fdcd9d56b",
            "url": "https://translate-dev.freebsd.org/api/units/1220674/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.867785Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The first rule denies all incoming traffic by default.  The second rule allows connections created by this system to pass out, while retaining state information on those connections.  This state information allows return traffic for those connections to pass back and should only be used on machines that can be trusted.  The ruleset can be loaded with:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5027083793624214381,
            "content_hash": 5027083793624214381,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:301",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 86,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 57,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219718/?format=api",
            "priority": 100,
            "id": 1220675,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=c5c3ca135f182b6d",
            "url": "https://translate-dev.freebsd.org/api/units/1220675/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.885206Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "In addition to keeping state, PF provides _lists_ and _macros_ which can be defined for use when creating rules.  Macros can include lists and need to be defined before use.  As an example, insert these lines at the very top of the ruleset:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4742877137554356529,
            "content_hash": -4742877137554356529,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:310",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 88,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 43,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219720/?format=api",
            "priority": 100,
            "id": 1220676,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=3e2dea5f4ac046cf",
            "url": "https://translate-dev.freebsd.org/api/units/1220676/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.962927Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "PF understands port names as well as port numbers, as long as the names are listed in [.filename]#/etc/services#.  This example creates two macros.  The first is a list of seven TCP port names and the second is one UDP port name.  Once defined, macros can be used in rules.  In this example, all traffic is blocked except for the connections initiated by this system for the seven specified TCP services and the one specified UDP service:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7525607547867227801,
            "content_hash": -7525607547867227801,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:322",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 90,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 76,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219722/?format=api",
            "priority": 100,
            "id": 1220677,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=178fabcebe601967",
            "url": "https://translate-dev.freebsd.org/api/units/1220677/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:06.975923Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Even though UDP is considered to be a stateless protocol, PF is able to track some state information.  For example, when a UDP request is passed which asks a name server about a domain name, PF will watch for the response to pass it back."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6102596682584023305,
            "content_hash": -6102596682584023305,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:334",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 92,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 45,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219724/?format=api",
            "priority": 100,
            "id": 1220678,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=2b4f38a66f1a1ef7",
            "url": "https://translate-dev.freebsd.org/api/units/1220678/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.054944Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "If there are no syntax errors, `pfctl` will not output any messages during the rule load.  Rules can also be tested before attempting to load them:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1348424840484294555,
            "content_hash": -1348424840484294555,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:344",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 95,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 26,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219726/?format=api",
            "priority": 100,
            "id": 1220679,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=6d496ec0789ef065",
            "url": "https://translate-dev.freebsd.org/api/units/1220679/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.077787Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Including `-n` causes the rules to be interpreted only, but not loaded.  This provides an opportunity to correct any errors.  At all times, the last valid ruleset loaded will be enforced until either PF is disabled or a new ruleset is loaded."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8942210434955554963,
            "content_hash": 8942210434955554963,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:353",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 97,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 42,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219728/?format=api",
            "priority": 100,
            "id": 1220680,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=fc191d0342513093",
            "url": "https://translate-dev.freebsd.org/api/units/1220680/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.152934Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Adding `-v` to a `pfctl` ruleset verify or load will display the fully parsed rules exactly the way they will be loaded.  This is extremely useful when debugging rules."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -3489882877597483941,
            "content_hash": -3489882877597483941,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:358",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 98,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 29,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219730/?format=api",
            "priority": 100,
            "id": 1220681,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=4f91720355157c5b",
            "url": "https://translate-dev.freebsd.org/api/units/1220681/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.160013Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section demonstrates how to configure a FreeBSD system running PF to act as a gateway for at least one other machine.  The gateway needs at least two network interfaces, each connected to a separate network.  In this example, [.filename]#xl0# is connected to the Internet and [.filename]#xl1# is connected to the internal network."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7633912976914259653,
            "content_hash": 7633912976914259653,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:366",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 100,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 53,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219732/?format=api",
            "priority": 100,
            "id": 1220682,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=e9f11b6803381ec5",
            "url": "https://translate-dev.freebsd.org/api/units/1220682/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.176515Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "First, enable the gateway to let the machine forward the network traffic it receives on one interface to another interface.  This sysctl setting will forward IPv4 packets:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8587854136490664503,
            "content_hash": -8587854136490664503,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:369",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 101,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 27,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219734/?format=api",
            "priority": 100,
            "id": 1220683,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=08d1d029cb9addc9",
            "url": "https://translate-dev.freebsd.org/api/units/1220683/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.262821Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Next, create the PF rules to allow the gateway to pass traffic.  While the following rule allows stateful traffic from hosts of the internal network to pass to the gateway, the `to` keyword does not guarantee passage all the way from source to destination:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 6395663101713776836,
            "content_hash": 6395663101713776836,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:394",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 108,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 44,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219736/?format=api",
            "priority": 100,
            "id": 1220684,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=d8c1f5b490b900c4",
            "url": "https://translate-dev.freebsd.org/api/units/1220684/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.357047Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "That rule only lets the traffic pass in to the gateway on the internal interface.  To let the packets go further, a matching rule is needed:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7546935599554099819,
            "content_hash": 7546935599554099819,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:402",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 110,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 26,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219738/?format=api",
            "priority": 100,
            "id": 1220685,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=e8bc19f1422bfa6b",
            "url": "https://translate-dev.freebsd.org/api/units/1220685/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.369430Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "While these two rules will work, rules this specific are rarely needed.  For a busy network admin, a readable ruleset is a safer ruleset.  The remainder of this section demonstrates how to keep the rules as simple as possible for readability.  For example, those two rules could be replaced with one rule:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3331196732019510446,
            "content_hash": 3331196732019510446,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:412",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 112,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 52,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219740/?format=api",
            "priority": 100,
            "id": 1220686,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ae3ac9c740f70cae",
            "url": "https://translate-dev.freebsd.org/api/units/1220686/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.381536Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The `interface:network` notation can be replaced with a macro to make the ruleset even more readable.  For example, a `$localnet` macro could be defined as the network directly attached to the internal interface (`$xl1:network`).  Alternatively, the definition of `$localnet` could be changed to an _IP address/netmask_ notation to denote a network, such as `192.168.100.1/24` for a subnet of private addresses."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -5017821112684097674,
            "content_hash": -5017821112684097674,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:421",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 114,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 60,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219742/?format=api",
            "priority": 100,
            "id": 1220687,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=3a5d1e4898024f76",
            "url": "https://translate-dev.freebsd.org/api/units/1220687/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.466376Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "If required, `$localnet` could even be defined as a list of networks.  Whatever the specific needs, a sensible `$localnet` definition could be used in a typical pass rule as follows:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6692055859551758816,
            "content_hash": -6692055859551758816,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:424",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 115,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219744/?format=api",
            "priority": 100,
            "id": 1220688,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=23210aa6da589620",
            "url": "https://translate-dev.freebsd.org/api/units/1220688/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.490988Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The following sample ruleset allows all traffic initiated by machines on the internal network.  It first defines two macros to represent the external and internal 3COM interfaces of the gateway."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3701977370232083555,
            "content_hash": 3701977370232083555,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:432",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 117,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219746/?format=api",
            "priority": 100,
            "id": 1220689,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=b36010cde737d463",
            "url": "https://translate-dev.freebsd.org/api/units/1220689/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.558886Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "For dialup users, the external interface will use [.filename]#tun0#.  For an ADSL connection, specifically those using PPP over Ethernet (PPPoE), the correct external interface is [.filename]#tun0#, not the physical Ethernet interface."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8578767233012246317,
            "content_hash": 8578767233012246317,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:437",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 118,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 31,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219748/?format=api",
            "priority": 100,
            "id": 1220690,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=f70de7589e74a72d",
            "url": "https://translate-dev.freebsd.org/api/units/1220690/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.568228Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This ruleset introduces the `nat` rule which is used to handle the network address translation from the non-routable addresses inside the internal network to the IP address assigned to the external interface.  The parentheses surrounding the last part of the nat rule `($ext_if)` is included when the IP address of the external interface is dynamically assigned.  It ensures that network traffic runs without serious interruptions even if the external IP address changes."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7964836720871368394,
            "content_hash": 7964836720871368394,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:453",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 120,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 72,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219750/?format=api",
            "priority": 100,
            "id": 1220691,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ee88c8cc518666ca",
            "url": "https://translate-dev.freebsd.org/api/units/1220691/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.648963Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Note that this ruleset probably allows more traffic to pass out of the network than is needed.  One reasonable setup could create this macro:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4422070750807105264,
            "content_hash": 4422070750807105264,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:456",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 121,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 24,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219752/?format=api",
            "priority": 100,
            "id": 1220692,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=bd5e59eb31809ef0",
            "url": "https://translate-dev.freebsd.org/api/units/1220692/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.657557Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "A few other pass rules may be needed.  This one enables SSH on the external interface:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2273469272069119727,
            "content_hash": -2273469272069119727,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:473",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 125,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 16,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219754/?format=api",
            "priority": 100,
            "id": 1220693,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=607303be0e8de111",
            "url": "https://translate-dev.freebsd.org/api/units/1220693/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.681994Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Note the `quick` keyword in this rule.  Since the ruleset consists of several rules, it is important to understand the relationships between the rules in a ruleset.  Rules are evaluated from top to bottom, in the sequence they are written.  For each packet or connection evaluated by PF, _the last matching rule_ in the ruleset is the one which is applied.  However, when a packet matches a rule which contains the `quick` keyword, the rule processing stops and the packet is treated according to that rule.  This is very useful when an exception to the general rules is needed."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7617055959750202911,
            "content_hash": -7617055959750202911,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:493",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 129,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 99,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219756/?format=api",
            "priority": 100,
            "id": 1220694,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=164ac7f624d129e1",
            "url": "https://translate-dev.freebsd.org/api/units/1220694/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.850090Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Configuring working FTP rules can be problematic due to the nature of the FTP protocol.  FTP pre-dates firewalls by several decades and is insecure in its design.  The most common points against using FTP include:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6375395589783654930,
            "content_hash": -6375395589783654930,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:500",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 131,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 35,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219758/?format=api",
            "priority": 100,
            "id": 1220695,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=27860b7d485a6dee",
            "url": "https://translate-dev.freebsd.org/api/units/1220695/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.862147Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "For those situations when FTP is required, PF provides redirection of FTP traffic to a small proxy program called man:ftp-proxy[8], which is included in the base system of FreeBSD.  The role of the proxy is to dynamically insert and delete rules in the ruleset, using a set of anchors, to correctly handle FTP traffic."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -5701890535054646372,
            "content_hash": -5701890535054646372,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:510",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 136,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 54,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219762/?format=api",
            "priority": 100,
            "id": 1220697,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=30ded0c4ade7e39c",
            "url": "https://translate-dev.freebsd.org/api/units/1220697/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.967562Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "For a basic configuration, three elements need to be added to [.filename]#/etc/pf.conf#.  First, the anchors which the proxy will use to insert the rules it generates for the FTP sessions:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 838773345247667330,
            "content_hash": 838773345247667330,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:527",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 141,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219764/?format=api",
            "priority": 100,
            "id": 1220698,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=8ba3ebe9da8da482",
            "url": "https://translate-dev.freebsd.org/api/units/1220698/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:07.993503Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Third, redirection and NAT rules need to be defined before the filtering rules.  Insert this `rdr` rule immediately after the `nat` rule:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4831080055263519347,
            "content_hash": 4831080055263519347,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:538",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 144,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219766/?format=api",
            "priority": 100,
            "id": 1220699,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=c30b71b6cf74e273",
            "url": "https://translate-dev.freebsd.org/api/units/1220699/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.072832Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This example covers a basic setup where the clients in the local network need to contact FTP servers elsewhere.  This basic configuration should work well with most combinations of FTP clients and servers.  As shown in man:ftp-proxy[8], the proxy's behavior can be changed in various ways by adding options to the `ftpproxy_flags=` line.  Some clients or servers may have specific quirks that must be compensated for in the configuration, or there may be a need to integrate the proxy in specific ways such as assigning FTP traffic to a specific queue."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2890325774267692513,
            "content_hash": -2890325774267692513,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:564",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 150,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 91,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219768/?format=api",
            "priority": 100,
            "id": 1220700,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=57e380059b9e4a1f",
            "url": "https://translate-dev.freebsd.org/api/units/1220700/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.158144Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The ICMP protocol sends and receives _control messages_ between hosts and gateways, mainly to provide feedback to a sender about any unusual or difficult conditions enroute to the target host.  Routers use ICMP to negotiate packet sizes and other transmission parameters in a process often referred to as _path MTU discovery_."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -5172894900361312457,
            "content_hash": -5172894900361312457,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:574",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 154,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 51,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219770/?format=api",
            "priority": 100,
            "id": 1220701,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=38362f7ecb88c737",
            "url": "https://translate-dev.freebsd.org/api/units/1220701/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.764221Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "From a firewall perspective, some ICMP control messages are vulnerable to known attack vectors.  Also, letting all diagnostic traffic pass unconditionally makes debugging easier, but it also makes it easier for others to extract information about the network.  For these reasons, the following rule may not be optimal:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7807172472809790395,
            "content_hash": -7807172472809790395,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:578",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 155,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 48,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219772/?format=api",
            "priority": 100,
            "id": 1220702,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=13a75a0009f6e445",
            "url": "https://translate-dev.freebsd.org/api/units/1220702/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.770810Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Additional options are available which demonstrate some of PF's flexibility.  For example, rather than allowing all ICMP messages, one can specify the messages used by man:ping[8] and man:traceroute[8].  Start by defining a macro for that type of message:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8911100949760063822,
            "content_hash": 8911100949760063822,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:595",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 159,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219774/?format=api",
            "priority": 100,
            "id": 1220703,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=fbaa9719cc18394e",
            "url": "https://translate-dev.freebsd.org/api/units/1220703/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.856480Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "If other types of ICMP packets are needed, expand `icmp_types` to a list of those packet types.  Type `more /usr/src/sbin/pfctl/pfctl_parser.c` to see the list of ICMP message types supported by PF.  Refer to http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xhtml[http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xhtml] for an explanation of each message type."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 1219067954154198023,
            "content_hash": 1219067954154198023,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:611",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 163,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219776/?format=api",
            "priority": 100,
            "id": 1220704,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=90eaffd86c6c5407",
            "url": "https://translate-dev.freebsd.org/api/units/1220704/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.873156Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Since `TRACERT.EXE` on Microsoft Windows systems uses ICMP echo request messages, only the first rule is needed to allow network traces from those systems.  Unix `traceroute` can be instructed to use other protocols as well, and will use ICMP echo request messages if `-I` is used.  Check the man:traceroute[8] man page for details."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3907310628327728435,
            "content_hash": 3907310628327728435,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:623",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 166,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 53,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219778/?format=api",
            "priority": 100,
            "id": 1220705,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=b6398e508c952533",
            "url": "https://translate-dev.freebsd.org/api/units/1220705/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.960190Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Internet protocols are designed to be device independent, and one consequence of device independence is that the optimal packet size for a given connection cannot always be predicted reliably.  The main constraint on packet size is the _Maximum Transmission Unit_ (MTU) which sets the upper limit on the packet size for an interface.  Type `ifconfig` to view the MTUs for a system's network interfaces."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -118894394446659213,
            "content_hash": -118894394446659213,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:630",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 168,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 64,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219780/?format=api",
            "priority": 100,
            "id": 1220706,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=7e599a2d9d38c173",
            "url": "https://translate-dev.freebsd.org/api/units/1220706/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:08.979002Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "TCP/IP uses a process known as path MTU discovery to determine the right packet size for a connection.  This process sends packets of varying sizes with the \"Do not fragment\" flag set, expecting an ICMP return packet of \"type 3, code 4\" when the upper limit has been reached.  Type 3 means \"destination unreachable\", and code 4 is short for \"fragmentation needed, but the do-not-fragment flag is set\".  To allow path MTU discovery in order to support connections to other MTUs, add the `destination unreachable` type to the `icmp_types` macro:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -9184218911623032198,
            "content_hash": -9184218911623032198,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:635",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 169,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 90,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219782/?format=api",
            "priority": 100,
            "id": 1220707,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=008b198f5948d27a",
            "url": "https://translate-dev.freebsd.org/api/units/1220707/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:09.059801Z"
        }
    ]
}